Behavioral task
behavioral1
Sample
3600-161-0x0000000000510000-0x00000000010FE000-memory.exe
Resource
win7-20240508-en
General
-
Target
3600-161-0x0000000000510000-0x00000000010FE000-memory.dmp
-
Size
11.9MB
-
MD5
4f1e72524f38929c1b6abeb764d15ced
-
SHA1
f3272cb66f1f93741350cb83adddf142ea9a01d3
-
SHA256
aa10edad16d0ea5ddefbdfeecb472d8058c38d66df75c9e2f8b2420c1238c3d9
-
SHA512
4f7407acd2fa4db937b11817f4bb6d1ad3f8f1b632233543925504ce37ed923465e7c3b2de689ac8df94721ca3ec82945a967d06761432bcbcd43932a0afccde
-
SSDEEP
98304:8//7c3fPIYjFBN1CzIrQUq5qE1g7xs+hXUUZdo/8MPum7UpJDc:g/7OAO4IrQth1g7x9HojIDc
Malware Config
Extracted
stealc
default
http://85.28.47.4
-
url_path
/920475a59bac849d.php
Signatures
-
Stealc family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3600-161-0x0000000000510000-0x00000000010FE000-memory.dmp
Files
-
3600-161-0x0000000000510000-0x00000000010FE000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 41KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE